dpacker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
40b264c4ec75b7100e536e4f127a5739_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
40b264c4ec75b7100e536e4f127a5739_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
40b264c4ec75b7100e536e4f127a5739_JaffaCakes118
-
Size
148KB
-
MD5
40b264c4ec75b7100e536e4f127a5739
-
SHA1
2c66e719b8ccc61ea2421afe79ede859d26311a2
-
SHA256
cfaebd7092faaa3b72fef2682b36492f361c122084587e1a482c15d0a0b8f215
-
SHA512
b763a6b9c1ffcbf92fa4dee7496952bd454f75dbdd6211af7d693bc28c64ac1364ec804627d076ed09ba436898cf801b79622ef7a6fd8b9c94191e3ae25ae348
-
SSDEEP
3072:GD3q/8w1qbNCvQe1rZe0/0wGuTFb2EvQTBf+vMitjwG:p/kCvQu0CTZQTB209G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40b264c4ec75b7100e536e4f127a5739_JaffaCakes118
Files
-
40b264c4ec75b7100e536e4f127a5739_JaffaCakes118.dll windows:4 windows x86 arch:x86
2793256f5a03e17baeed7e6b67cc0066
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LeaveCriticalSection
MultiByteToWideChar
GetLastError
EnterCriticalSection
DeleteCriticalSection
GetProcAddress
VirtualQuery
GetSystemDirectoryW
GetModuleFileNameW
SetLastError
GetWindowsDirectoryW
DeleteFileW
LoadLibraryW
GetSystemTimeAsFileTime
CreateFileW
CloseHandle
UnmapViewOfFile
GetCurrentProcess
Sleep
FreeConsole
InterlockedExchange
GetStdHandle
GetCurrentProcessId
SetEnvironmentVariableW
WideCharToMultiByte
InitializeCriticalSection
FreeLibrary
HeapFree
HeapAlloc
DeleteFileA
HeapReAlloc
GetModuleHandleA
ExitProcess
SetStdHandle
GetFileType
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetModuleFileNameA
RtlUnwind
ReadFile
SetHandleCount
GetStartupInfoA
SetFilePointer
HeapSize
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
LoadLibraryA
QueryPerformanceCounter
GetTickCount
LCMapStringA
LCMapStringW
GetLocaleInfoA
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
user32
CharLowerW
CharLowerA
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Exports
Exports
dpack_GetInterface
pack_close
pack_extractA
pack_extractW
pack_findfirstA
pack_findfirstW
pack_findnextA
pack_findnextW
pack_mem2f_extractA
pack_mem2f_extractW
pack_mem2f_packA
pack_mem2f_packW
pack_mem_extract
pack_mem_free
pack_mem_pack
pack_openA
pack_openW
pack_taste
pack_unpackfA
pack_unpackfW
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ